Sciweavers

3296 search results - page 533 / 660
» Gathercast with Active Networks
Sort
View
118
Voted
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 7 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
CHI
2006
ACM
16 years 1 months ago
Emoticons convey emotions without cognition of faces: an fMRI study
In this paper, we describe the brain activities that are associated with emoticons by using functional MRI (fMRI). In communication over a computer network, we use faces such as c...
Masahide Yuasa, Keiichi Saito, Naoki Mukawa
102
Voted
ICC
2009
IEEE
159views Communications» more  ICC 2009»
15 years 7 months ago
Evidences Behind Skype Outage
—Skype is one of the most successful VoIP application in the current Internet spectrum. One of the most peculiar characteristics of Skype is that it relies on a P2P infrastructur...
Dario Rossi, Marco Mellia, Michela Meo
94
Voted
IV
2007
IEEE
99views Visualization» more  IV 2007»
15 years 7 months ago
Visualizing endangered indigenous languages of French Polynesia with LEXUS
This paper reports on the first results of the DOBES project ‘Towards a multimedia dictionary of the Marquesan and Tuamotuan languages of French Polynesia’. Within the framewo...
Gaby Cablitz, Jacquelijn Ringersma, Marc Kemps-Sni...
ICITA
2005
IEEE
15 years 6 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon